Results 21 to 30 of about 142,803 (291)
An Operational Approach to Maritime Cyber Resilience [PDF]
As a result of the last decades development of technology and increased connectivity of maritime vessels, the need for maritime cyber security is undoubtedly present.
Erlend Erstad +2 more
doaj +1 more source
Protecting Cyber Physical Systems Using a Learned MAPE-K Model
Industry 4.0 leverages on cyber-physical systems (CPSs) that enable different physical sensors, actuators, and controllers to be interconnected via switches and cloud computing servers, forming complex online systems.
Ibrahim Elgendi +3 more
doaj +1 more source
Various types of cyber threats [PDF]
Security of the Internet and online communication has become an essential challenge in contemporary world. Paper discusses different types of cyber threats: cyber-attack, cyber terrorism and cybercrime.
Luknar Ivana, Jovanović Filip
doaj +1 more source
Proactive threat detection for connected cars using recursive Bayesian estimation [PDF]
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber ...
al-Khateeb, Haider +4 more
core +3 more sources
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
Possibilities of modelling the impact of cyber threats in cyber risk insurance
In the last few years, we could see that a lot of world organizations are contested by different ways, which we are called as cyber threats or cyber risks.
Pavlik Lukas
doaj +1 more source
Cyberthreats on Implantable Medical Devices
The significant and rapid technological development in the field of medical care, and Implanted Medical Device, clearly lead to improve the quality of care and effectiveness of treatment for numerous diseases that were previously difficult to be ...
Mohammed N. A. Sabra
doaj +1 more source
The high-speed development of Fifth Generation technologies announces a new era for the internet of things (IoT), distinguished by high-rate connectivity, speed, and low latency.
Umed H. Jader +2 more
doaj +1 more source
Aspects of Digital Forensics in South Africa [PDF]
This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics.
Irons, Alastair, Ophoff, Jacques
core +2 more sources
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro +2 more
core +1 more source

